Cargando…

Steganography and watermarking /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Yang, Ching-Nung (Editor ), Lin, Chia-Chen (Editor ), Chang, Chin-Chen (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Nova Publishers, [2013]
Colección:Privacy and identity protection
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_ocn847526898
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 130426s2013 nyu ob 001 0 eng
010 |a  2020676289 
040 |a DLC  |b eng  |e rda  |c DLC  |d YDXCP  |d E7B  |d EBLCP  |d AGLDB  |d OCLCF  |d VTS  |d AU@  |d STF  |d M8D  |d N$T  |d OCLCO  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9781626183179  |q (epub) 
020 |a 1626183171 
020 |z 9781626183131  |q (hardcover) 
020 |z 1626183139 
029 1 |a AU@  |b 000056870098 
029 1 |a DEBBG  |b BV043776350 
029 1 |a NZ1  |b 15028109 
029 1 |a DEBSZ  |b 450753085 
035 |a (OCoLC)847526898 
042 |a pcc 
050 0 0 |a TA1637 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 0 |a 005.8/2  |2 23 
049 |a UAMI 
245 0 0 |a Steganography and watermarking /  |c Ching-Nung Yang, Chia-Chen Lin, and Chin-Chen Chang, editors. 
264 1 |a New York :  |b Nova Publishers,  |c [2013] 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Privacy and identity protection 
504 |a Includes bibliographical references and index. 
588 |a Description based on print version record and CIP data provided by publisher. 
505 0 |a STEGANOGRAPHY AND WATERMARKING; STEGANOGRAPHY AND WATERMARKING; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: DATA HIDING FOR BINARY IMAGES; 1. INTRODUCTION; 2.WEIGHTED MATRIX METHOD; 4. PAIR-WISE METHOD; 5. HISTOGRAM-BASED SCHEME; 6. DATA HIDING BASED ON BINARY DOCUMENT; 7. COMPARISON; ACKNOWLEDGMENTS; REFERENCES; Chapter 2: REVERSIBLE DATA HIDING SCHEME FOR HALFTONE IMAGES; 1. INTRODUCTION; 2. RELATED WORKS; 3. LUT-BASED REVERSIBLE DATA HIDING SCHEME FOR HALFTONE IMAGES; 4. SIMULATION RESULTS; CONCLUSIONS; ACKNOWLEDGMENT; REFERENCES. 
505 8 |a Chapter 3: REVERSIBLE DATA HIDING SCHEMES FOR JPEG IMAGES1. Introduction; 2. Overview of JPEG Standard; 3. LSB Based Reversible JPEG Watermarking; 4. Difference Expansion Based Reversible JPEG Watermarking; 5. Histogram Based Reversible JPEG Watermarking; 6. EOB Position Based Reversible JPEG Watermarking; 7. Equivalence Based JPEG Watermarking; 8. Authentication Application; References; Chapter 4: LOSSLESS DATA HIDING BASED ON VQ; ABSTRACT; INTRODUCTION; RELATED WORKS; 3. THE PROPOSED SCHEME; 4. EXPERIMENTAL RESULTS; CONCLUSION; REFERENCES. 
505 8 |a Chapter 5: A HIGH QUALITY STEGANOGRAPHIC SCHEME WITH PIXEL-VALUE DIFFERENCING1. INTRODUCTION; 2. PREVIOUS WORKS; 3. THE PROPOSED STEGANOGRAPHY SCHEME; 4. EXPERIMENT AND COMPARISON; CONCLUSION; REFERENCES; APPENDIX; Chapter 6: REVERSIBLE DATA HIDING BASED ON HISTOGRAM TECHNIQUE; ABSTRACT; 1. INTRODUCTION; 2. RDH USING HISTOGRAM-SHIFTING; 3. RDH BY ADJUSTING THE AUXILIARY INFORMATION; 4. HIGH-CAPACITY RDH BASED ON HISTOGRAM MODIFICATION; 5. HISTOGRAM-BASED RDH WITH MINOR DISTORTION; CONCLUSION; ACKNOWLEDGMENTS; REFERENCES; Chapter 7: STEGANOGRAPHY IN SCRIPT FILES; 7.1. INTRODUCTION. 
505 8 |a 7.2. STEGANOGRAPHY SCHEMES USING SCRIPT FILES7.3. HYBRID STEGANOGRAPHIC FRAMEWORK; 7.4. EXPERIMENTAL RESULTS AND ANALYSIS; CONCLUSIONS; REFERENCES; Chapter 8: THE STATE-OF-THE-ART STEGANOGRAPHY FOR 3D MESHES; 1. INTRODUCTION; 2. DISTORTION STEGANOGRAPHY; 3. REPRESENTATION STEGANOGRAPHY; 4. PERMUTATION STEGANOGRAPHY; CONCLUSION; REFERENCES; Chapter 9: STEGANALYSIS ALGORITHM FOR DETECTING THE HIDDEN INFORMATION IN IMAGES; 1. INTRODUCTION; 2. RELATED WORKS; 3. PROPOSED SCHEME; 4. EXPERIMENT RESULT; CONCLUSION; REFERENCES; Chapter 10: SVD-BASED DIGITAL IMAGE WATERMARKING; 1. INTRODUCTION. 
505 8 |a 2. IMAGE FEATURES EXTRACTION AND SVD TRANSFORMATION3. GENERAL METHOD OF SVD-BASED DIGITAL WATERMARKING; 4. COMPARISON BETWEEN SVD-BASED AND DWT-BASED WATERMARKING; CONCLUSIONS; ACKNOWLEDGMENTS; REFERENCES; Chapter 11: ROBUST SVD-DCT DOMAIN IMAGE WATERMARKING; 11.1. INTRODUCTION; 11.2. SVD-BASED ROBUST WATERMARKING; 11.3. SVD-DCT HYBRID DOMAIN WATERMARKING SCHEMES; 11.4. EXPERIMENTAL RESULTS; 11.5. DISCUSSION; REFERENCES; Chapter 12: FRAGILE WATERMARKING FOR CONTENT AUTHENTICATION WITH TAMPER LOCALIZATION; 1. INTRODUCTION; 2. OVERVIEW OF DIGITAL HALFTONING AND INVERSE HALFTONING. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Image processing  |x Security measures. 
650 0 |a Image files  |x Security measures. 
650 0 |a Digital watermarking. 
650 0 |a Cryptography. 
650 6 |a Traitement d'images  |x Sécurité  |x Mesures. 
650 6 |a Fichiers d'images  |x Sécurité  |x Mesures. 
650 6 |a Tatouage numérique. 
650 6 |a Cryptographie. 
650 7 |a digital watermarking.  |2 aat 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Cryptography  |2 fast 
650 7 |a Digital watermarking  |2 fast 
700 1 |a Yang, Ching-Nung,  |e editor. 
700 1 |a Lin, Chia-Chen,  |e editor. 
700 1 |a Chang, Chin-Chen,  |e editor. 
776 0 8 |i Print version:  |t Steganography and watermarking  |d New York : Nova Publishers, [2013]  |z 9781626183131 (hardcover)  |w (DLC) 2013007522 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=591935  |z Texto completo 
938 |a YBP Library Services  |b YANK  |n 10752330 
938 |a EBSCOhost  |b EBSC  |n 591935 
938 |a ebrary  |b EBRY  |n ebr10719468 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL3022470 
994 |a 92  |b IZTAP